Collating and Evaluating Findings
With a successful search, you are armed with some information to discern possible holes. This is where the deep research on security takes place. This part of the chapter helps you look for potential security holes in your armor. It explains some techniques I have found helpful in performing security audits and penetration tests against sites I administer. First, I explain how to gather your information in a manner that gives you a logical map of the network, giving you better ideas about what function each host plays in a network. Next you will look for evidence of trust in a network. To a hacker, trust is another way of saying security hole. Finally, you will continue your examination of the scouting information ...
Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.